Behavioral task
behavioral1
Sample
c7cb8dbdcd8cfdb6d2440080afc3e715b6984b5ab2b88e9919fbb70136325368.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
c7cb8dbdcd8cfdb6d2440080afc3e715b6984b5ab2b88e9919fbb70136325368.doc
-
Size
290KB
-
MD5
9e165cbfb9c884725bbd4df0f83b139a
-
SHA1
713a6d2bc02f69c677c15a6552185eca010394dd
-
SHA256
c7cb8dbdcd8cfdb6d2440080afc3e715b6984b5ab2b88e9919fbb70136325368
-
SHA512
cc0a6546df04e53546ab456d380c61b8859555e7219a34f42161157b157d59bfc31caff7b216be57186aa9d369fc7d2a0f64e2c9bf53956941b779478b52261f
-
SSDEEP
3072:Fnmahvzr1u2/MbZWMRch0bND6b38zFjjac92mM0WDTAG7UaVGVFoQ9cTMsTViEdp:YkvgZWth0bd6b3QnJ2JbuaaqTMCJp
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c7cb8dbdcd8cfdb6d2440080afc3e715b6984b5ab2b88e9919fbb70136325368.doc.doc windows office2003
ThisDocument
Module1